{"id":37497,"date":"2019-01-25T16:17:11","date_gmt":"2019-01-25T16:17:11","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=837e14991e0293d89132eaea56b013ce"},"modified":"2019-01-25T16:17:11","modified_gmt":"2019-01-25T16:17:11","slug":"benefits-of-ai-and-machine-learning-for-cloud-security","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/benefits-of-ai-and-machine-learning-for-cloud-security\/","title":{"rendered":"Benefits of AI and machine learning for cloud security"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/grace-halverson\">Grace Halverson<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">25 Jan, 2019<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p>It takes a year and almost \u00a33 million pounds to contain the average data breach, according to a\u00a0<a href=\"https:\/\/securityintelligence.com\/series\/ponemon-institute-cost-of-a-data-breach-2018\/\" >2018 study by the Ponemon Institute<\/a>. And despite growing cloud adoption, many IT professionals still\u00a0<a href=\"https:\/\/www.itpro.co.uk\/cloud-security\/30923\/what-to-look-for-in-a-secure-cloud-system\" >highlight the cloud<\/a>\u00a0as the primary area of vulnerability within their business.<\/p>\n<p>To combat this and lower their chances of experiencing a breach, some companies are turning to AI and machine learning to enhance their cloud security.<\/p>\n<p>AI, or artificial intelligence, is software that can solve problems and think by itself in a way that\u2019s similar to humans. Machine learning is a subset of AI that uses algorithms to learn from data. The more data patterns it analyses, the more it processes and self-adjusts based on those patterns, and the more valuable its insights become.<\/p>\n<p>While not a silver bullet or a panacea, this approach shifts practices from prevention to real-time threat detection, putting companies and cloud service providers a step ahead of cyber attackers. Here are some of the benefits.<\/p>\n<hr style=\"color: #2ba9db; background-color: #87cefa; height: 2px; border-width: 0px; margin: 1em 0;\" \/>\n<p style=\"text-align: left;\"><em><strong>Up to 95 percent of data leaks in the cloud through 2020 will happen because of human error. Learn more about how AI and machine learning are helping combat cybercriminals in this whitepaper. <\/strong><\/em><\/p>\n<p style=\"background-color: #0278c1; padding: 5px; margin-bottom: 10px; display: inline; text-align: center;\"><a style=\"color: #ffffff;\" href=\"https:\/\/dennistrk.cvtr.io\/click?lid=7400&amp;pid=48&amp;sid=&amp;utm_medium=referral&amp;utm_source=cloudpro.co.uk&amp;utm_campaign=Lead%20gen&amp;utm_content=7907-top\">Download now<\/a><\/p>\n<hr style=\"color: #0278c1; background-color: #87cefa; height: 2px; border-width: 0px; margin: 1em 0;\" \/>\n<h2>Big Data Processing<\/h2>\n<p>Cybersecurity systems produce massive amounts of data\u2014more than any human team could ever sift through and analyse. Machine learning technologies use all of this data to detect threat events. The more data processed, the more patterns it detects and learns, which it then uses to spot changes in the normal pattern flow. These changes could be cyber threats.<\/p>\n<p><!--wysiwyg_see-related_plugin--><\/p>\n<p>\nFor example, machine learning takes note of what\u2019s considered normal, such as from when and where employees log into their systems, what they access regularly, and other traffic patterns and user activities. Deviations from these norms, such as logging in during the early hours of the morning, get flagged. This in turn means that potential threats can be highlighted and dealt with in a faster fashion.<\/p>\n<h2>Event Detection and Blocking<\/h2>\n<p>When AI and machine learning technologies process the data generated by the systems and find anomalies, they can either alert a human or respond by shutting a specific user out, among other options.<\/p>\n<p>By taking these steps, events are often detected and blocked within hours, shutting down the flow of potentially\u00a0dangerous code into the network and preventing a data leak. This process of examining and relating data across geography in real-time enables businesses to potentially get days of warning and time to take action ahead of security events.<\/p>\n<hr style=\"color: #2ba9db; background-color: #87cefa; height: 2px; border-width: 0px; margin: 1em 0;\" \/>\n<p style=\"text-align: left;\"><em><strong>Almost three quarters of successful data breaches gain access through an endpoint. Download this whitepaper now to learn more about securing your laptops, tablets and mobiles through the cloud. <\/strong><\/em><\/p>\n<p style=\"background-color: #0278c1; padding: 5px; margin-bottom: 10px; display: inline; text-align: center;\"><a style=\"color: #ffffff;\" href=\"https:\/\/dennistrk.cvtr.io\/click?lid=7400&amp;pid=48&amp;sid=&amp;utm_medium=referral&amp;utm_source=cloudpro.co.uk&amp;utm_campaign=Lead%20gen&amp;utm_content=7907-bottom\">Download now<\/a><\/p>\n<hr style=\"color: #0278c1; background-color: #87cefa; height: 2px; border-width: 0px; margin: 1em 0;\" \/>\n<h2>Delegation to the Automation<\/h2>\n<p>When security teams have AI and machine learning technologies handle routine tasks and first level security analysis, they are free to focus on more critical or complex threats.<\/p>\n<p>This does not mean these technologies can replace human analysts, as cyber attacks often originate from both human and machine efforts and therefore require responses from both humans and machines as well. However, it does allow analysts to prioritise their workload and get their tasks done more efficiently. <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Grace Halverson<\/p>\n<p>        25 Jan, 2019    <\/p>\n<p>      It takes a year and almost \u00a33 million pounds to contain the average data breach, according to a\u00a02018 study by the Ponemon Institute. And despite growing cloud adoption, many IT professionals &#8230;<\/p>\n","protected":false},"author":530,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-37497","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/37497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/530"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=37497"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/37497\/revisions"}],"predecessor-version":[{"id":37498,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/37497\/revisions\/37498"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=37497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=37497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=37497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}